As there is little information available about this vulnerability at this time, I'd say that typical defense-in-depth techniques would be your best bet. Given that this is a local DoS vulnerability, limiting local access to the system is your first line. A HIPS solution could also be configured to monitor for this specific exploit.